Friday, May 4, 2012

Fake Hard Drive Diagnostic Virus; Browser Pop-up/Redirection Fix


Pacific NorthWest Computers KNOWS rogue security and fake software applications very well. Fake software virus applications make up for 85% of the infections that we see on a day-to-day, week-to-week, month by month basis here in the shop. At first it was just fake security software programs. But the newest "trend" in the fake malicious software world is fake hard drive diagnostic software.

This fake diagnostic software virus pretends to have found issues with your hard drive, proceeds to hide your data (to seem more legitimate) and then tries to sell it self as a fix for all "problems" it has identified with your hard drive. When first released, it was not to difficult to remove. But the issue we are running into now however is that when a customer brings a system in that has this virus on it, we aren't just worrying about just getting the virus removed. But more importantly, reversing the changes the virus has made to an affected system. The big challenge has been with Browser hooks.


Most of the time when we encounter this virus it will actually "hook" into (or simply put; infect) the executable "IExplorer.exe", which is Internet Explorer. Once "hooked" the virus can change, modify how Internet Explorer functions and can generate pop-ups and redirect searches and navigation in the browser. All after the virus cleaning is completed on the affected computer. Now, most of the time programs like Spybot Search & Destroy are very effective at reversing system modifications created by viruses. But so far, this browser hook issue is not "automatically" fixed by virus scanners and utilities and since hooks can sometimes be impossible to remove. This type of an issue can prevent us from declaring a system clean and can sometimes require us to reinstall the computer's operating system. Well, we think we figured out a fix!

After working on a computer from a local insurance agency, I did some extensive poking around an infected computer's file system and registry and was able to locate a registry location for something called “DOMStorage” under Internet Explorer’s HKEY_ CURRENT_USER registry key (HKCU\Software\Microsoft\Internet Explorer\DOMStorage). In this registry entry, I found folders matching the names for some of the websites that were being generated in the random IE pop-ups's. I knew I was onto something but did not know what "DOMStorage" even was nor did I know why or how Internet Explorer even used it.

After doing some research on DOMStorage (http://en.wikipedia.org/wiki/Web_storage) it looks like DOMStorage, or Document Object Model Storage, is a web application software method and protocol used for storing data in a web browser. So I thought to myself, “Well if they can store data there, they could very well plant a program in those locations to hide and allow themselves to generate those pop-ups!”. So I went ahead and deleted all of the folders in the DOMStorage registry location (and there were A LOT of sites listed in there) and it’s safe to now say after removing those folders there have not been ANY Internet Explorer pop-ups since! After pop-ups coming up several times a minute, the system is running great and is running flawlessly for several days; with web surfing and all! No browser re-directions or anything!
So I would say this is another problem solved and another win against viruses for Pacific NorthWest Computers!

Jon Pienkowski
Owner/Operator
Pacific NorthWest Computers

Wednesday, April 4, 2012

Top 5 Myths Computer Repair Customers Believe About “Going Apple”

There seems to be a perceived consensus among a segment of my customer base that believes going Mac would solve all their ills, save them money, and provide numerous other benefits. While there are situations where Macs are justified, the steamrolling in the media by the Apple-centric movement to iEverything helps fuel a majority of this misconception surrounding the Apple brand...

Monday, August 22, 2011

Force Checking for Updates on Android Devices



Normally your phone has a process which checks for pending updates every "X" amount of hours. But what if you want to force the device to check for updates immediately? This is a trick I found a while back and continue to use time and time again.
  • Open the standard Android Phone (Dialer) application
  • Enter *#*#checkin#*#* on the dialer keypad ( *#*#2432546#*#*)
  • On the last entry of the *, your phone will pause while it is checking for updates.
  • Once it has completed, you will see a yellow exclamation icon in the notification (or different icon depending on your installed theme) bar letting you know that checkin has been completed and if an update exists you should be notified.
  • It also appears that Market updates are also rechecked as part of this process, so any new updated applications will also notify you to upgrade your applications
That's it! Go into your phone's settings through you home menu and check for system updates. If anything the update should already be downloading!

This has been shown to work on 2.1 (Eclair), 2.2 (FroYo), and 2.3 (Gingerbread). However, not all custom phone dialers support the codes, so try to use the stock Android dialer if you have multiple installed. The stock dialer is the one that ships on Google experience devices like the Nexus One, Nexus S, or Droid1.

Monday, April 18, 2011

Find the Cheapest Gas; No Matter Where You Are!


Because the gas prices are so out of control right now ($80 fill ups and all), I am always using my GasBuddy Android app find the cheapest gas; no matter where I am. They offer a website (Gasbuddy.com) and smartphone apps (iPhone, Android & Windows Phone Apps) for people to find and post the cheapest gasoline prices in their neighborhood, or where ever they may be! These apps and their website are something everyone needs to know about!

Thursday, April 14, 2011

Rogue Hard Drive Error Repair Software

A new fake HD repair/error finding virus software is going around, and it hides all of your personal data so it  looks like all of your data has been lost or deleted; RUN FULL, MANUAL, VIRUS SCANS ASAP IF IT HAS BEEN A WHILE and MORE OFTEN THAN USUAL!

Friday, February 18, 2011

New Computer Software To Have & Use: 101 *INCLUDING VIRUS CLEAN-UP HOW-TO!!


With all the software that is out there for surfing the web and for security, it can be kind of confusing which programs you should or should NOT use. Maybe you have a brand new computer that you need to setup. Or you are looking to get your current system spruced and/or re-secured. Or maybe you are looking to overhaul your system's software completely! Here are some of my recommended software programs that I personally like, use and recommend. As well as a basic "How-To" to help get you going on running virus scans and to assist with tuning up your computer!


Google’s Chrome Web Browser
The Web is all about innovation, and Chrome sets the pace with dozens of new features to deliver a faster, more secure and customizable Web browsing experience for all! Google Chrome raises the bar for security. The new malware and phishing protection helps protect from viruses, worms, trojans and spyware to keep people safe while surfing on the Web.


Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software. Microsoft Security Essentials is a free and effective antivirus that is easy to use, and is always kept up to date. So you can be assured your PC is protected by the latest technology. It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple. Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times.


Malwarebytes' Anti-Malware (MBAM):
Malwarebytes' Anti-Malware is a high performance anti-malware application that thoroughly removes even the most advanced malware and spyware. With one of the fastest, most effective quick scans and malware removal capabilities on the market, this program is the perfect addition to your PC's defenses. The full version of the product includes a number of key features, including the ability to schedule updates and scans and most importantly, a real-time malware protection module that blocks malicious processes before they even start.


Safer Networking’s Spybot Search & Destroy:
Spybot - Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behavior to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies. If you see new toolbars in your Internet Explorer that you haven't intentionally installed, if your browser crashes inexplicably, or if your home page has been "hijacked" (or changed without your knowledge), your computer is most probably infected with spyware. Even if you don't see the symptoms, your computer may be infected, because more and more spyware is emerging. Spybot-S&D is also absolutely free.
**NOTE! During the installation of this program, a feature called "Tea-Timer" will attempt to install and run. DO NOT INSTALL or ARM THIS FEATURE! It can be very intrusive and create conflicts with other security software you may have installed.


Trend Micro's HijackThis:
HijackThis inspects your computers browser and operating system settings to generate a log file of the current state of your computer. Using HijackThis you can selectively remove unwanted settings and files from your computer. Because the settings identified in a HijackThis log file can belong to both legitimate software and unwanted malware, it is important to use extreme caution when choosing to removing anything using HijackThis.


Piriform's CCleaner:
CCleaner is a free PC optimization tool. It combines a system cleaner that removes unused and temporary files from your system and also a fully featured registry cleaner! CCleaner allows Windows to run faster, more efficiently and gives you more hard disk space. The best part is that it's Small, Fast and Free!


VSRevo Group's Revo Uninstaller Free:
Revo Uninstaller free lists the installed programs and components for all and current user. With a choice of views, as well as a context menu, information on program components is available: program properties, their registry entries and links to manufacturer's web site, for a start. The "Search" option finds installed applications just by typing the first few letters of their name. Revo Uninstaller Free scans for "leftovers" with advanced algorithms that are precise, fast and very effective in searching for leftover Windows Services, Drivers, File associations, Shell Extensions, COM components, Windows Installer components, program settings and more!


MyDefrag (formerly JKDefrag) is a disk defragmenter and optimizer for Windows 2000/2003/XP/Vista/2008/X64. Completely automatic and very easy to use, fast, low overhead, with several optimization strategies, and can handle floppies, USB disks, memory sticks, and anything else that looks like a disk to Windows. Why use this defragger instead of the standard Windows defragger? 
  • Much faster. 
  • Totally automatic, extremely easy to use.
  • Optimized for daily use.
  • Disk optimization, several strategies.
  • Directories are moved to the beginning of the disk.
  • Reclaims MFT reserved space after disk-full.
  • Maintains free spaces for temporary files.
  • Can defragment very full harddisks.
  • Can defragment very large files.
  • Can defragment individual directories and files.
  • Can be run automatically with the Windows Scheduler.
  • Can be used from the commandline.
  • Can be used as a screen saver.
  • Can be run from cdrom or memory stick.
  • Sources available, can be customized.


    Piriform Recuva:
    Accidentally deleted an important file? Lost something important when your computer crashed? No problem! Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3 player. And it's free!


    CUTEpdf Writer:
    Create PDF documents on the fly — for Free! Portable Document Format (PDF) is the de facto standard for the secure and reliable distribution and exchange of electronic documents and forms around the world. CutePDF Writer (formerly CutePDF Printer) is the free version of commercial PDF creation software. CutePDF Writer installs itself as a "printer subsystem". This enables virtually any Windows applications (must be able to print) to create professional quality PDF documents - with just a push of a button! ALL FOR FREE! 


    VideoLAN VLC Media Player:
    VLC media player is a highly portable multimedia player for various audio and video formats as well as DVDs, VCDs, and various streaming protocols without external codec or program. It can also be used as a server to stream in unicast or multicast in IPv4 or IPv6 on a high-bandwidth network.
    VLC Media Player can play:
    • MPEG-1, MPEG-2 and MPEG-4 / DivX files from a hard disk, a CD-ROM drive, and so on
    • DVDs, VCDs, and Audio CDs.
    • From satellite cards (DVB-S).
    • Network streams: UDP/RTP Unicast, UDP/RTP Multicast, HTTP, RTSP, MMS, etc.
    • From acquisition or encoding cards (on GNU/Linux and Windows only).


      Sumatra PDF Viewer:
      Sumatra PDF is a slim, free, open-source PDF reader for Windows. Sumatra has a very minimalistic design and is no where NEAR the security risk that Adobe Reader can be. Simplicity has a higher priority than a lot of features with Sumatra. It's small, secure and starts up very fast.


      Google's Picasa Picture Manager & Editor:
      Picasa is software that helps you instantly find, edit and share all the pictures on your PC. Every time you open Picasa, it automatically locates all your pictures (even ones you forgot you had) and sorts them into visual albums organized by date with folder names you will recognize. You can drag and drop to arrange your albums and make labels to create new groups. Picasa makes sure your pictures are always organized. Picasa also makes advanced editing simple by putting one-click fixes and powerful effects at your fingertips. And Picasa makes it a snap to share your pictures, you can email, print photos home, make gift CDs, instantly share your images and albums, and even post pictures on your own blog.




       Now here are some basic instructions on how to use the security programs we recommended above!
      1. Double click on a security program’s icon; MS Security Essentials, Spybot, MBAM, etc...
      2. Locates the program’s “Update” button and update the software;
      3. You may need to click ok a few times but this process takes only a minute to download and install updates on a high-speed internet connection.
      4. Once the program has been updated, select “Scan Now” or “Check for Problems” and run a system scan.
      5. If you are given the option to run Quick or Full scan; always run the Full scan. This process can take an hour to a couple of hours to complete and will slow down the computer if you decide to use the computer as it scans.
      6. Once the program says it’s completed its scan, delete or quarantine any and all findings; if the malware can’t be removed, contact Pacific NorthWest Computers ASAP!
      • Run full scans with theyour security software every 2 weeks if you can; at-least once a month. All the security software is 100% free but can also bee purchased. During updates, these programs may pop up an ad for a purchasable version of themselves. But don’t be alarmed! Just simply click an available “later” or “ok” button or just close the box with its upper right "X" button.
      • Use CCleaner to help with the “junk file cleanup” that needs to be routinely cleared for security and performance purposes. To do this, just find and double click the CCleaner icon and then simply click “Run Cleaner”. When it says it’s completed, you’re all done!
      • Use MyDefrag to help keep the files on your hard drive organized as well as help to keep your computer and hard drive running the best that it can! At least once a month run a "System Disk Monthly" de-fragmentation on your "C:\" drive. If you have external hard drives, you can run a "Data Disk Monthly" de-fragmentation on those drives as well to help maintain optimal read/write performance. Also, there area Daily and Weekly defragmentions you can run for both types of hard drives as well.

      Tuesday, February 15, 2011

      Recycle your old computer, computer parts, peripherals and electronics!


      If you live in the Vancouver, WA Pacific NorthWest Computers does take in some computer products.
      Give us a call to find out more!
      Keep Electronics out of landfills and recycle what you don't need!

      Jon Pienkowski
      Pacific NorthWest Computers
      www.pnwcomputers.com
      360.624.7379

      Wednesday, January 6, 2010

      Rogue Security Program Infections; At a Glance!

      More and more everyday I am see and hear about people becoming infected with Rogue security Software virus. 
      Rogue security software is a form of computer malware that deceives or misleads users into paying for the fake or simulated removal of malware. Rogue security software, in recent years, has become a growing and serious security threat in desktop computing. – Wiki

      Right now the most common form of infection they are using is web page hi-jacking and “trap” websites that are created to “host” the virus (why using Firefox is so important).

      So what people end up encountering is a web page that has been hacked, hi-jacked, infected or exploited that is unknowingly “hosting” this virus and ends up spreading the infection to whom ever visits the website. In doing this, their trap has been set and the infections begin! This form of infection is commonly refered to as a “Drive-by Download“.

      After the computer becomes infected, users start to see and encounter “security warning” icons in their task bar (lower right of the desktop), pop-ups warning of an infection and fake animated virus scans indicating your computer is infected as the virus itself tries to build its credibility. In  most cases the virus can even infect the Windows Security Center making it even harder for users to identify whether the software is real or not. However the goal being achieved out all of this is for the virus creators to make money. So they are hoping that the users of the computers that become infected, and fooled by the “song and dance” the virus puts on, and buy their infectious and fake security software.

      So I wanted this to be a little heads up and explanation for everybody about this subject since it is the most common repair I encounter to date.

      Be Aware, Stay Informed and Scan Often!
       
      ~Jon Pienkowski, Pacific NorthWest Computers

      Sunday, December 6, 2009

      BCC Your Emails!

      I have started using the BCC feature of my email religiously to prevent emailing other people’s email addresses when forwarding or distributing “mass address” emails. If  you ever get an email with that classic LIST, or lists, of various email addresses then PLEASE pull those emails outta there! I have recently blogged about the dangers of Spam, forwarded and chain emails. (Please check back through our archive to find that important read.)

      As a quick refresher; Don’t trust ANYTHING you get in as an email if its not from somebody I know or is a chain/forwarded email! No matter the subject or topic of that  email! Social engineering is used where ever and when ever it can be applied to whom ever can apply it towards; through ANY medium!
      Better be safe than sorry so if something does happen to REALLY catch your attention, just Google it and see what comes up! 

      BUT ONLY IF IT IS FROM SOMEONE YOU KNOW!

      If we all could start using BCC (blind carbon copy), we can send what ever you wanted to whom ever  you wanted, and have it will look like it was specifically sent to that person! No sending of others emails addresses again!
      Complete anonymity!
      Hope that helps some people out!!


      Jon Pienkowski – Owner
      Pacific NorthWest Computers

      Wednesday, November 4, 2009

      The Facts on Forwarded Emails, Chain-mail & E-mail Petitions

      Spam picture from  MauritsBurgers' flickr photos.

      By now, most people are familiar with Snopes.com and/or Truthorfiction.com for determining whether information received via e-mail is true or false. (If not, start using them!) Well, Snopes.com recently put together a fantastic "E-mail Fact List". The the purpose of the list; to inform our readers on what really happens when you send/receive forwarded e-mails, chain letter e-mails and those e-mail petitions. So we at Pacific NorthWest Computers is posting that information to help inform everyone on whats going on behind the scenes with chain mail, the dangers in forwarding those emails  and the facts on e-mail petitions. Enjoy and please forward to friends, family and co-workers!

      1. Almost all e-mails that ask you to add your name and forward on to others are similar to that mass letter years ago that asked people to send business cards to the little kid in Florida who wanted to break the Guinness Book of Records for the most cards. All it was, and all any of this type of e-mail is, is a way to get names and 'cookie' tracking information for telemarketers and spammers to validate active e-mail accounts for their own profitable purposes. The host sender is getting a copy each time it gets forwarded and then is able to get lists of 'active' e-mail addresses to use in SPAM e-mails or sell to other spammers. If you have been sending out (FORWARDING) the above kinds of e-mail, now you know why you get so much SPAM.
        •  Do yourself a favor and STOP adding your name(s) to those types of listings, regardless of how inviting they might sound. You may think you are supporting a great cause, but you are NOT! Instead, you will be getting tons of junk mail later. Plus, you are helping the spammers get rich;. Let's not make it easy for them.

      2. REMOVE ALL EMAIL ADDRESSES STILL ATTACHED BEFORE YOU FORWARD A MESSAGE. IT IS PUTTING EVERYONE'S NAME OUT THERE. Most people use a nickname for their email just so their real name is not out there on the Internet. BUT....... if YOU have listed their real name in your contacts, it will also show up next to their email address. Be a friend and delete all the names before forwarding. Even better, send everything by BCC. That's BLIND CARBON COPY. That way NO names will ever show up on an email.

      3. That brings us to E-mail petitions. E-mail petitions are NOT acceptable to Congress or any other organization. To be acceptable, petitions must have a signed signature and full address of the person signing the petition.

      I hope this opens some eyes and educates folks on whats going on behind the scenes with chain mail, the dangers in forwarding those emails  and the facts on e-mail petitions. The aware we are to how cyber-criminals work, the better we are on preventing SPAM and identity issues.


      Please pass this blog posting along to all  friends, family or co-workers!

      Jon Pienkowski
      _______________________
      Pacific NorthWest Computers
      www.pnwcomputers.com
      Main content is from Snopes.com
      Edited and Formatted by Pacific NorthWest Computers